首页> 外文会议>Military Communications Conference, 2009. MILCOM 2009 >Security analysis of the Bootstrap protocol for deny-by-default Mobile Ad-hoc Networks
【24h】

Security analysis of the Bootstrap protocol for deny-by-default Mobile Ad-hoc Networks

机译:默认拒绝移动自组织网络的Bootstrap协议的安全性分析

获取原文

摘要

In previous work, we proposed a “Bootstrap” protocol for establishing neighbor relationships, between two mobile nodes in a mission critical deny-by-default Mobile Ad-hoc Network. In this paper, we formally characterize the security properties of this Bootstrap protocol, striving to answer the following questions: 1) To what extent can an adversary undermine the correctness and performance of the Bootstrap protocol? 2) To what extent can the Bootstrap protocol be improved in anticipation of an adversary? Our analyses employ a combination of formal logic and two standard automated model checkers, SPIN and PRISM. Two types of threats are considered, which we call the subverted node and the subverted link. In the subverted link analysis, we further categorize the adversary into two variants, which we call dark-red or light-red in correspondence with having detailed Bootstrap-protocol-specific knowledge or only generic neighbor setup knowledge, respectively. The subverted node analysis shows that the adversary cannot TCP-SYN-flood-like attack nor deadlock the good node within the Bootstrap protocol. The subverted link analysis shows that the adversary cannot undermine the correctness of the protocol, in the sense that the protocol''s performance is only degraded in a bounded manner by the dark-red adversary or in a benign manner by the light-red adversary.
机译:在先前的工作中,我们提出了一种“ Bootstrap”协议,用于在关键任务默认情况下拒绝移动Ad-hoc网络中的两个移动节点之间建立邻居关系。在本文中,我们正式描述了该Bootstrap协议的安全性,并努力回答以下问题:1)对手可以在多大程度上破坏Bootstrap协议的正确性和性能? 2)在预期对手的情况下,Bootstrap协议可以在多大程度上得到改进?我们的分析结合了形式逻辑和两个标准的自动模型检查器SPIN和PRISM。考虑了两种类型的威胁,我们将其称为颠覆节点和颠覆链接。在颠覆式链接分析中,我们将对手进一步分为两个变体,分别对应于具有详细的Bootstrap协议特定知识或仅具有通用邻居设置知识,我们将其称为暗红色或浅红色。颠倒的节点分析表明,对手既不能进行类似TCP-SYN-flood的攻击,也不能死锁Bootstrap协议中的好节点。颠覆的链接分析表明,对手不能破坏协议的正确性,从某种意义上说,协议的性能仅由暗红色对手以有界方式降低,或者由浅红色对手以良性方式而降低。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号